help required to solve two drag and drop questions
Question 1:
----------------------------------------------------------
1) Verification of identity --->
2) presenting of false identity --->
3) impeding legitimate use --->
4) protection of backup tapes --->
5) improperly altering data --->
choices
A Spoofing
B Authentication
C Denial of services
D physical security
E Tampering
We need to match 1,2,3.. to A,b,c..
-----------------------------------------------------------
Answer :1 i am thinking
1-B
2-A
3-C
4-D
5-E
Question 2:
----------------------------------------------------------
1) Used for bulk encryption of data in an established channel --->
2) Encapsulate protocol negotiation , key
exchange , and communication --->
3) Establish secure communication with previous unknown parties --->
4) Can attest to a principle having been associated with data --->
choices
A Digital Signature
B SSL
C Asymmetric Encryption
D Symmetric Encryption
We need to match 1,2,3.. to A,b,c..
-----------------------------------------------------------
Answer :2 i am thinking
1-A
2-B
3-C
4-D
pl send your comment /answers